ReClassNET / ReClass.NET-MemoryPipePluginLinks
A ReClass.NET plugin which allows direct memory access via dll injection.
☆25Updated 5 years ago
Alternatives and similar repositories for ReClass.NET-MemoryPipePlugin
Users that are interested in ReClass.NET-MemoryPipePlugin are comparing it to the libraries listed below
Sorting:
- A ReClass.NET plugin which uses the process handles of an other process to access the data of the target.☆29Updated 4 years ago
- BattlEye BEClient<->BEService usermode emulator☆82Updated 6 years ago
- driver manual mapper☆27Updated 5 years ago
- Just a thing i am trying to do, testing some things out and so on. This is for a game called csgo and basically are for people how knows …☆121Updated 4 years ago
- ☆75Updated 5 years ago
- ☆185Updated 6 years ago
- NoBastian - Universal Ring3 IPC based BattlEye/EAC/FaceIt/ESEA/MRAC bypass☆147Updated 7 years ago
- Plugin for ReClass.Net (using vulnerable driver to read process memory)☆94Updated 5 years ago
- This x64dbg plugin sets the page protection for memory mapped views in scenarios which cause NtProtectVirtualMemory to fail.☆123Updated 8 years ago
- The program draws with win32k gdi functions in the kernel while NtGdiDdDDISubmitCommand is being hooked.☆335Updated 5 years ago
- a more stable & secure read/write virtual memory for kernel mode drivers☆161Updated 5 years ago
- ☆42Updated 6 years ago
- Obfuscates all RTTI (Run-time type information) inside a binary☆200Updated 8 years ago
- Just my first IOCTL try☆75Updated 5 years ago
- External mid-function hooking method to retrieve register data☆92Updated 7 years ago
- This DKOM exploit enables any app in usermode to access physical memory directly☆227Updated 8 years ago
- Windows driver for spoofing serial number of HDDs☆219Updated 3 years ago
- pasted eft cheat☆111Updated 4 years ago
- Simple benchmark for findpattern implementations.☆162Updated 10 months ago
- ☆171Updated 8 years ago
- ☆145Updated 4 years ago
- A library to manipulate physical memory from usermode.☆296Updated 2 years ago
- Windows kernel samples☆257Updated 6 years ago
- driver mapper / capcom wrapper☆225Updated 6 years ago
- BattlEye compatible injector, done completely from user-mode.☆54Updated 2 years ago
- manually map driver for a signed driver memory space☆163Updated 4 years ago
- Abusing SpeedFan driver ability of physical memory manipulation☆116Updated 7 years ago
- Hooking kernel functions by abusing alignment☆248Updated 4 years ago
- 🥭windows memory library aimed towards game hacking☆42Updated 5 years ago
- VAC2 Emulator & VAC3 Response Parser☆84Updated 8 years ago